ZBU Protocol
This Dune Dashboard gives you access to these details in chronology: - Total Users - Total ZIP - Users registered in last 7 days - Timestamp of each registered wallet - Leaderboard with address and ZIP - ZIP balance snapshot for Protocol reward distribution
Staking Pools
This Dune Dashboard gives you access to these details in chronology:
- Total Yield Distributed in USDT - Total Yield Distributed in ZBU - Total Yield Claimed in USDT - Total Yield Claimed in ZBU Binance Chain Staking - Total ZBU staked - Total ZBU withdraw from staking - Current ZBU in staking BASE Chain Staking - Total ZBU staked - Total ZBU withdraw from staking - Current ZBU in staking ETH Chain Staking - Total ZBU staked - Total ZBU withdraw from staking - Current ZBU in staking Transaction History of staking on BSC Transaction History of staking on BASE Transaction History of staking on ETH Transaction History of LP staking on BASE
Voting Escrow
0xcf08D1EC5d8e566D95299399307F75f98D6AEa03
Reward Distributor
0x17710aAeb8FcE1D789C09f30BC7a4863363B3Da1
Launchpad
0x1fd60E4DCfC797f5b8FffC6e9Dd52c44a90f4C12
Lens
0x6E59d86de385Bd1af3F2E1A6c9994B97822Ed8D9
Reward Distributor
0x2C8C89C442436CC6C0a77943E09c8Daf49Da3161
Lens
0xe77f6aCD24185e149e329C1C0F479201b9Ec2f4B
Launchpad
0x9b664a30c18cee9d888d006a7115a382e6882f81
Voting Escrow
0xd3e8cD2eDbf252860E02ffb245fD654b1ab30f30
User Registration
0x15C5c9634cAcea37C3990e4B7343153be1302bEb
Reward Distributor
0x624658D0F9C903B8633e765b4E7B3552c9B568dc
Lens
0x9EE29085f4883e118febE4ac8E2737A8Fe709446
Launchpad
0xdbffb48bd4a886b540a24f6f4aa3e69af35dce0d
Voting Escrow
0x8e76Cdf3b14c540aB54aFa7f8492AC1d16Ecfb35
Token Contract: 0xe77f6aCD24185e149e329C1C0F479201b9Ec2f4B
Token Contract: 0x2C8C89C442436CC6C0a77943E09c8Daf49Da3161
Token Contract: 0x4D3dc895a9EDb234DfA3e303A196c009dC918f84
Security in ZBU Protocol is multifaceted, focusing on protecting the blockchain infrastructure, user transactions, and data integrity. This section introduces the comprehensive security strategies implemented, including encryption methods, smart contract auditing, network surveillance, and contingency plans for potential breaches. It underscores ZBU Protocol's commitment to creating a secure and trustworthy environment for its participants, reflecting the latest advancements in blockchain security and risk management
ZBU Token BASE chain
Hacken
Voting Escrow, Reward Distributor, Launchpad, Lens
Certik
Balancer Vault, Weighted Pool, Stable Pool
Certora
Voting Escrow, Reward Distributor, Launchpad, Lens
Trail of Bits
Voting Escrow, Reward Distributor, Launchpad, Lens
Openzepplin
Voting Escrow, Reward Distributor, Launchpad, Lens
Hacken
Balancer Vault, Weighted Pool, Stable Pool
Trail of Bits
Voting Escrow, Reward Distributor, Launchpad, Lens
Certora
Code Review and Auditing:
Regularly Smart-Contract Audits and Pentest with thorough code reviews, security audits, Grey-box testing along with Application code, and deployer daemon.
Authentication and Authorization:
Strong authentication and authorization mechanisms with ECC to ensure that only authorized deployers can initiate deployments. Multi-factor authentication (MFA) for additional layer of security
Encryption and Secure Communication Channels:
SHA-256 Encryption is used to protect data in transit and ensure that all communication between deployers and the blockchain network is conducted over secure channels.
Regular Updates and Patch Management:
All software components of the Platform, Application & deployer daemon are updated with the latest security patches and updates recommended by Community and active hackathon participations
Intrusion Detection and Prevention Systems:
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are deployed to monitor network traffic for suspicious activities and block potential threats.
Access Control and Least Privilege:
Principle of least privilege and Whitelisted IPs are implemented to all system components, ensuring that each part of the system has only the access necessary to perform its function.
Rate Limiting and Throttling:
Rate limiting and throttling is implemented to prevent abuse of the deployment system, using denial-of-service protection and secure network
Logging and Monitoring:
Comprehensive logs of all activities are updated and regularly monitored for signs of unauthorized access or unusual behavior.
KYT Screening
All incoming and outgoing transactions intracting within the pools are screened using chainalysis for proper compliance and AML screening.
Zeebu's security measures go beyond surface-level precautions. The protocol has undergone rigorous audits by six industry-leading firms: . Each brings unique expertise to scrutinize different aspects of Zeebu's architecture.
These audits dissect smart contracts, examine tokenomics, and stress-test network resilience. They uncover potential vulnerabilities before malicious actors can exploit them. While no system is invulnerable, Zeebu's multi-layered approach to security audits demonstrates a commitment to safeguarding user assets and maintaining the integrity of its decentralized ecosystem.